10.1145/2405186.2405190acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmiddlewareConference Proceedings
research-article

Management and search of private data on storage clouds

ABSTRACT

The article presents a solution for storage and management of private data kept in Internet Storage Clouds. The solution supports operations over the data kept ciphered, including reads, writes and searches based on multiple keywords and relevance classification. The approach is based on a middleware architecture supported by homomorphic encryption techniques combined with dynamic indexing mechanisms. The solution preserves conditions of privacy without need to either decipher data during operations in the cloud or transfer the data during searches. The article further describes an implementation prototype of the solution and its evaluation. The performance obtained in different implementation scenarios is analyzed and compared to a solution promoted by AMAZON S3. The evaluation shows that the solution is viable, offers more security and control for the user and does not aggravate conditions of latency and data availability.

References

  1. P. Mell and T. Grance, "Draft nist working definition of Cloud computing," Referenced on Jan. 23rd, 2010 Online at http://csrc.nist.gov/groups/SNS/Cloud-computing/index.html, 2010.Google ScholarGoogle Scholar
  2. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A View of Cloud Computing," Communications of the ACM 53 (4) 50--58, April 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Privacy Rights Clearinghouse. Chronology of data breaches. http://www.privacyrights.org/data-breach.Google ScholarGoogle Scholar
  4. S. Kamara and K. Lauter, "Cryptographic Cloud storage," in Proceedings of Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization 2010, January 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum, and E. W. Felten. Lest we remember: Cold boot attacks on encryption keys. In Proceedings of the 17th Usenix Security Symposium, San Jose, CA, July--August 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Li, M. Krohn, D. Mazières, and D. Shasha. Secure untrusted data repository (SUNDR). In Proceedings of the 6th Symposium on Operating Systems Design and Implementation, pages 91--106, San Francisco, CA, December 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. J. Feldman, W. P. Zeller, M. J. Freedman, and E. W. Felten. SPORC: Group collaboration using untrusted Cloud resources. In Proceedings of the 9th Symposium on Operating Systems Design and Implementation, Vancouver, Canada, October 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Cloud Security Alliance, "Security guidance for critical areas of focus in Cloud computing," 2009, http://www.Cloudsecurityalliance.org.Google ScholarGoogle Scholar
  9. D. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proc. of IEEE Symposium on Security and Privacy'00, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. R. Popa, C. Redfield, N. Zeldovich, H. Balakrishnan. CryptDB: Protecting Confidentiality with Encrypted Query Processing. SOSP '11, October 23--26, 2011, Cascais, Portugal. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," in Proc. of EUROCRYP'04, volume 3027 of LNCS. Springer, 2004.Google ScholarGoogle Scholar
  12. R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions," in Proc. of ACM CCS'06, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. H. Abu-Libdeh, L. Princehouse, and H. Weatherspoon. RACS: A case for Cloud storage diversity. Proc. of the 1st ACM Symposium on Cloud Computing, pages 229--240, June 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of the 18th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), Prague, Czech Republic, May 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. C. Manning, P. Raghavan, H. Schütze. "An Introduction to Information Retrieval", Cambridge University Press, 2009 Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Spärck Jones, Karen, S. Walker, and Stephen E. Robertson. 2000. A probabilistic model of information retrieval: Development and comparative experiments. IP&M 36(6): 779--808, 809--840. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Heinz, Steffen, and Justin Zobel. 2003. Efficient single-pass index construction for text databases. JASIST 54(8):713--729. DOI: dx.doi.org/10.1002/asi.10268 Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. Bessani, M. Correia, B. Quaresma, F. André, P. Sousa. DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds. EuroSys'11, April 10--13, 2011, Salzburg, Austria Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. R. Chandra, R. Gamboni, S. Mehrotra, K. Seamons, N. Venkatasubramanian. iDataGuard: An Interoperable Security Middleware for Untrusted Internet Data Storage. Middleware'08 Companion, December 1--5, 2008, Leuven, Belgium.Google ScholarGoogle Scholar

Index Terms

  1. Management and search of private data on storage clouds

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader
          About Cookies On This Site

          We use cookies to ensure that we give you the best experience on our website.

          Learn more

          Got it!